VARIoT IoT vulnerabilities database
    | VAR-202509-0714 | CVE-2025-57086 | Shenzhen Tenda Technology Co.,Ltd. of w30e Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda W30E V16.01.0.19 (5037) was discovered to contain a stack overflow in the String parameter in the formDeleteMeshNode function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of w30e A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHOs, small businesses, and small shops
                        
| VAR-202509-1340 | CVE-2025-57085 | Shenzhen Tenda Technology Co.,Ltd. of w30e Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL  | 
                            Tenda W30E V16.01.0.19 (5037) was discovered to contain a stack overflow in the v17 parameter in the UploadCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of w30e A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHOs, small businesses, and small shops
                        
| VAR-202509-0592 | CVE-2025-57078 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the pppoeServerWhiteMacIndex parameter in the formModifyPppAuthWhiteMac function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda
                        
| VAR-202509-1017 | CVE-2025-57087 | Shenzhen Tenda Technology Co.,Ltd. of w30e Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda W30E V16.01.0.19 (5037) was discovered to contain a stack overflow in the countryCode parameter in the werlessAdvancedSet function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of w30e A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda W30E is an enterprise-grade wireless router designed for SOHOs, small businesses, and small shops. This vulnerability stems from the inability of the countryCode parameter in the werlessAdvancedSet function to properly validate the length of input data
                        
| VAR-202509-1440 | CVE-2025-57072 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the staticRouteGateway parameter in the formSetStaticRoute function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda
                        
| VAR-202509-1119 | CVE-2025-57071 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the vpnUsers parameter in the formAddVpnUsers function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda. This vulnerability stems from the failure to properly validate the length of the input data in the vpnUsers parameter in the formAddVpnUsers function
                        
| VAR-202509-1234 | CVE-2025-57070 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the gstUp parameter in the guestWifiRuleRefresh function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is an all-in-one micro-enterprise gateway launched by Tenda, designed specifically for small and medium-sized enterprises (SMEs) and providing integrated network solutions
                        
| VAR-202509-0500 | CVE-2025-57069 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the pPppUser parameter in the getsinglepppuser function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. Tenda G3 is an all-in-one micro-enterprise gateway launched by Tenda. Designed specifically for small and medium-sized enterprises, it provides integrated network solutions. 
The Tenda G3 suffers from a buffer overflow vulnerability caused by a failure to properly validate the length of the input data in the getsinglepppuser function's pPppUser parameter
                        
| VAR-202509-0715 | CVE-2025-57063 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the portMappingIndex parameter in the formDelPortMapping function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda
                        
| VAR-202509-1341 | CVE-2025-57062 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the delDhcpIndex parameter in the formDelDhcpRule function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda. This vulnerability stems from the fact that the delDhcpIndex parameter in the formDelDhcpRule function fails to properly validate the length of input data
                        
| VAR-202509-0913 | CVE-2025-57061 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain multiple stack overflows in the formIPMacBindModify function via the ruleId, ip, mac, v6 and remark parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda
                        
| VAR-202509-1120 | CVE-2025-57059 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the dhcpIndex parameter in the addDhcpRule function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda. This vulnerability stems from the failure of the addDhcpRule function to properly validate the length of the input data in the dhcpIndex parameter
                        
| VAR-202509-1235 | CVE-2025-57058 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain multiple stack overflows in the formSetDebugCfg function via the pEnable, pLevel, and pModule parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The Tenda G3 is a QoS VPN router from the Chinese company Tenda
                        
| VAR-202509-0811 | CVE-2025-57057 | Shenzhen Tenda Technology Co.,Ltd. of G3 Stack-based buffer overflow vulnerability in firmware | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the listStr parameter in the ipMacBindListStore function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. Shenzhen Tenda Technology Co.,Ltd. of G3 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. Tenda G3 is an all-in-one micro-enterprise gateway launched by Tenda, designed specifically for small and medium-sized enterprises, providing integrated network solutions. This vulnerability stems from the failure of the listStr parameter in the ipMacBindListStore function to properly validate the length of input data
                        
| VAR-202509-0772 | CVE-2025-9065 | Rockwell Automation ThinManager Server Request Forgery Vulnerability | 
                                      
                                        CVSS V2: 8.3 CVSS V3: - Severity: High  | 
                            A server-side request forgery security issue exists within Rockwell Automation ThinManager® software due to the lack of input sanitization. Authenticated attackers can exploit this vulnerability by specifying external SMB paths, exposing the ThinServer® service account NTLM hash. Rockwell Automation ThinManager is thin client management software from Rockwell Automation. It allows thin clients to be assigned to multiple remote desktop servers simultaneously. An attacker can exploit this vulnerability to forge server-side requests
                        
| VAR-202509-0459 | CVE-2025-8008 | plural Rockwell Automation Product Exceptional State Handling Vulnerability | 
                                      
                                        CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM  | 
                            A security issue exists in the protected mode of EN4TR devices, where sending specifically crafted messages during a Forward Close operation can cause the device to crash. 1756-en2tr series a firmware, 1756-en2tr series b firmware, 1756-en2tr series c firmware etc. Rockwell Automation The product contains an exceptional state handling vulnerability.Service operation interruption (DoS) It may be in a state
                        
| VAR-202509-1087 | CVE-2025-8007 | plural Rockwell Automation Product vulnerabilities | 
                                      
                                        CVSS V2: - CVSS V3: 6.5 Severity: MEDIUM  | 
                            A security issue exists in the protected mode of 1756-EN4TR and 1756-EN2TR communication modules, where a Concurrent Forward Close operation can trigger a Major Non-Recoverable (MNFR) fault. This condition may lead to unexpected system crashes and loss of device availability. 1756-en2tr series a firmware, 1756-en2tr series b firmware, 1756-en2tr series c firmware etc. Rockwell Automation There are unspecified vulnerabilities in the product.Service operation interruption (DoS) It may be in a state
                        
| VAR-202509-0677 | CVE-2025-7970 | Rockwell Automation of FactoryTalk Activation Manager Vulnerability regarding lack of authentication for critical features in | 
                                      
                                        CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH  | 
                            A security issue exists within FactoryTalk Activation Manager.  An error in the implementation of cryptography within the software could allow attackers to decrypt traffic. This could result in data exposure, session hijacking, or full communication compromise. Rockwell Automation of FactoryTalk Activation Manager There is a vulnerability in the lack of authentication for critical features.Information may be obtained. Rockwell Automation is a leading global provider of industrial automation and control solutions, focused on helping companies achieve smart manufacturing and digital transformation
                        
| VAR-202509-0308 | CVE-2025-40798 | Siemens' SIMATIC PCS neo and User Management Component (UMC) Out-of-bounds read vulnerability in | 
                                      
                                        CVSS V2: - CVSS V3: 7.5 Severity: High  | 
                            A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SIMATIC PCS neo V6.0 (All versions), User Management Component (UMC) (All versions < V2.15.1.3). Affected products contain a out-of-bounds read vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to cause a denial of service condition. Siemens' SIMATIC PCS neo and User Management Component (UMC) Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
                        
| VAR-202509-0310 | CVE-2025-40797 | Siemens' SIMATIC PCS neo and User Management Component (UMC) Out-of-bounds read vulnerability in | 
                                      
                                        CVSS V2: - CVSS V3: 7.5 Severity: High  | 
                            A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SIMATIC PCS neo V6.0 (All versions), User Management Component (UMC) (All versions < V2.15.1.3). Affected products contain a out-of-bounds read vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to cause a denial of service condition. Siemens' SIMATIC PCS neo and User Management Component (UMC) Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state